execution contract#2475
Conversation
prepared an execution contract draft Signed-off-by: Dan Calavrezo <195309321+dcalavrezo-qorix@users.noreply.github.com>
|
|
|
The created documentation from the pull request is available at: docu-html |
AlexanderLanin
left a comment
There was a problem hiding this comment.
Lots of comments, but this was a great read! Good content IMHO!
Co-authored-by: Alexander Lanin <Alexander.Lanin@etas.com> Signed-off-by: Dan Calavrezo <195309321+dcalavrezo-qorix@users.noreply.github.com>
|
Thanks for the write up, looks over all quite good and a great baseline we can work out the small other stuff. |
Co-authored-by: Alexander Lanin <Alexander.Lanin@etas.com> Signed-off-by: Dan Calavrezo <195309321+dcalavrezo-qorix@users.noreply.github.com>
Co-authored-by: lurtz <727209+lurtz@users.noreply.github.com> Signed-off-by: Dan Calavrezo <195309321+dcalavrezo-qorix@users.noreply.github.com>
solved comments from PRs Signed-off-by: Dan Calavrezo <195309321+dcalavrezo-qorix@users.noreply.github.com>
|
@dcalavrezo-qorix whats the state here? |
|
@dcalavrezo-qorix last call for action! I will close it next week if there is no feedback if we now can merge or not |
Please do not close it yet. |
|
Let’s resume the discussion and look at a few remaining gaps around traceability and long-term reproducibility, if that is ok with you. For ease of discussion I picked persistency as an example, but the same observations likely apply to most S-CORE repositories. I would like to focus specifically on build reproducibility over a longer time horizon (10+ years).
We currently do not generate and commit MODULE.bazel.lock. Even if
Without committing the lock file, we are not freezing the fully resolved module graph. From a reproducibility and auditability standpoint, this seems like a gap.
We still rely on overrides (for ex. git_override).
For long-term reproducibility, overrides pointing to external GitHub repos may not be sufficient unless we define a mirroring or archival strategy.
We fetch external toolchain artifacts (e.g. SDK archives, toolchain tarballs) from vendor URLs. Even if we verify SHA256, long-term availability of those URLs is not guaranteed. all such artifacts must be mirrored into an S-CORE controlled artifact store, or we accept vendor URLs as a long-term dependency. This should probably be made explicit in the design decision.
The devcontainer currently references an image tag (e.g. v1.1.0). If we rely on devcontainer as part of the reproducible developer environment, we may want to: pin by digest (@sha256:…), or define a policy that tagged images are immutable and archived. will add more stuff |
Defined the MSV for dev platform Signed-off-by: Dan Calavrezo <195309321+dcalavrezo-qorix@users.noreply.github.com>
improved wording based on comments Signed-off-by: Dan Calavrezo <195309321+dcalavrezo-qorix@users.noreply.github.com>
|
I think DR would not be enough. We also need some kind of Stakeholder requirements -> tool_Req... |
No description provided.